This application is based upon and claims the benefit of priority from prior Japanese Patent Applications No. 2006-304362, filed Nov. 9, 2006; and No. 2006-329519, filed Dec. 6, 2006, the entire contents of both of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates to a method and apparatus which enable the moving, dividing, or merging of, e.g., copyrighted content.
2. Description of the Related Art
Recently, distribution services for downloading rich content such as music from a content server to an information terminal such as a mobile terminal or personal computer are becoming popular. An information terminal that uses a service of this kind temporarily stores downloaded content in memory. In accordance with a user's play operation, the stored content is read from the memory and played.
Some content has rights information to secure its copyright. Content of this type is encrypted and stored. The encrypted content is decrypted and played under conditions defined by the rights information. The play conditions include, e.g., the number of times of play and the period of play. To encrypt content, a scheme is used which encrypts the content by using a content encryption key formed from, e.g., a random number, encrypts the content encryption key by using a key encryption key, and encrypts the key encryption key by using a binding key. The binding key uses, e.g., specific identification information of a terminal. When this encryption scheme is used, the content is bound to the terminal. Hence, only the information terminal that has encrypted the content can play it.
There are recently proposed various mechanisms to transfer or assign the acquired content rights to another person. For example, a rights transfer method is proposed which transfers content bound by specific identification information from a terminal to another terminal and transfers the specific identification information via a secure transmission path. After the transfer, use of the specific identification information on the terminal of the transfer destination is enabled while use of the specific identification information by the terminal of the transfer source is inhibited (e.g., Jpn. Pat. Appln. KOKAI Publication No. 2003-303137).
There is also proposed another method that provides a server to manage use of rights and makes terminals share the rights via the server (e.g., Jpn. Pat. Appln. KOKAI Publication No. 2005-092851).
However, the conventionally proposed rights transfer methods have the following problems to solve. In Open Mobile Alliance Digital Rights Management V2 (to be referred to as OMA DRM V2 hereinafter), each terminal acquires terminal binding rights from, e.g., a rights server. Effective measures to transfer the rights upon changing the model or assign the rights to another terminal are not proposed yet. For example, there is rights information that changes details of the rights in accordance with the consumption situation after acquisition. In this case, it is necessary to rewrite the rights information and rewrite the signature, as needed. When the rights information and signature are rewritten, rights object RO need to be re-encrypted. However, any detailed mechanism for it is not proposed yet.
The conventionally proposed rights sharing methods have the following problems to solve. In Open Mobile Alliance Digital Rights Management Secure Content Exchange (to be referred to as OMA DRM SCE hereinafter), a user domain is set for, e.g., each family or group to allow terminals in the user domain to share rights. However, when content rights are shared in a user domain, and the environment changes because of, e.g., house-moving of a member, it is necessary to continuously allow the member to use the shared content. A measure for this has been demanded.
It is the first object of the present invention to provide a copyrighted content moving method that enables to appropriately move, between terminals, copyrighted content bound to a terminal in consideration of a change in details of the right.
It is the second object of the present invention to provide an information terminal apparatus that enables rights sharing for a long term even when the environment of sharing members changes.
According to a first aspect of a copyrighted content moving method of the present invention, a first terminal acquires a public key of a second terminal from the second terminal, re-encrypts encryption key information contained in a rights object as a moving target on the basis of the acquired public key of the second terminal, and transmits encrypted content and a rights object containing the re-encrypted encryption key information to the second terminal.
According to a second aspect of a copyrighted content moving method of the present invention, a first terminal acquires a public key of a rights server from the rights server and re-encrypt encryption key information contained in a rights object as a moving target on the basis of the acquired public key of the rights server, and transmits a second rights object containing the re-encrypted encryption key information to the rights server. The rights server acquires a public key of a second terminal of a moving destination from the second terminal, re-encrypts, on the basis of the acquired public key of the second terminal, the encryption key information contained in the second rights object sent from the first terminal, and transmits a third rights object containing the re-encrypted encryption key information to the second terminal, and the encrypted content is transmitted from the first terminal to the second terminal.
According to a third aspect of a copyrighted content moving method of the present invention, a first terminal acquires a public key of a second terminal from the second terminal, re-encrypts encryption key information contained in a rights object as a moving target on the basis of the acquired public key of the second terminal, and transmits a second rights object containing the re-encrypted encryption key information to a rights server. The rights server changes, on the basis of its private key, signature information contained in the second rights object sent from the first terminal, and transmits a third rights object containing the changed signature information to the second terminal, and encrypted content is transmitted from the first terminal to the second terminal.
According to a fourth aspect of a copyrighted content moving method of the present invention, a first terminal acquires a public key of a second terminal from the second terminal, re-encrypts encryption key information contained in a rights object as a moving target on the basis of the acquired public key of the second terminal, and transmits encrypted content and a second rights object containing the re-encrypted encryption key information to the second terminal. The second rights object sent from the first terminal from the second terminal is transferred to a rights server. The rights server changes, on the basis of its private key, signature information contained in the second rights object sent from the second terminal, and transmits a third rights object containing the changed signature information to the second terminal.
According to a first aspect of an information terminal apparatus of the present invention, user domain management information including a first user domain key and a second user domain key different from the first user domain key is stored, and upon receiving a user domain division/merger request, a second rights object corresponding to a user domain of a division/merger destination is generated by re-encrypting, on the basis of the stored second user domain key, encryption key information contained in a first rights object.
According to a second aspect of an information terminal of the present invention, upon receiving a user domain merger request, a second rights object corresponding to a user domain of a merger destination is generated by re-encrypting, on the basis of a second user domain key stored in advance, encryption key information encrypted by a first user domain key and adding the re-encrypted encryption key information to a first rights object.
According to a third aspect of an information terminal of the present invention, upon receiving a user domain division request, a second rights object corresponding to a user domain of a division destination is generated by deleting, from a first rights object, one of encryption key information encrypted by a first user domain key and encryption key information encrypted by a second user domain key.
Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention, and together with the general description given above and the detailed description of the embodiments given below, serve to explain the principles of the invention.
The embodiments of a copyrighted content moving method according to the present invention will be described below with reference to the accompanying drawing.
In the first embodiment of the present invention, a moving source terminal TA executes binding conversion processing of a rights object RO and rewrite processing of rights information and its signature, thereby moving copyrighted content directly from a terminal to another terminal.
The communication network NW includes, e.g., an Internet Protocol (IP) network represented by the Internet and a plurality of access networks to access the IP network. A cable subscriber network using, e.g., a digital subscriber line (DSL) and optical transmission line, a wireless local area network (LAN), and a mobile communication network are used as the access networks. A Universal Serial Bus (USB) cable as the signal cable CB, Bluetooth® (BT) or local communication such as wireless LAN is used.
Each of the terminals TA and TB includes a mobile terminal such as a mobile phone or personal digital assistant (PDA) and has the following arrangement.
The radio unit 12 wirelessly communicates with a base station of the communication network NW by using a wireless access scheme such as code division multiple access-frequency division duplex (CDMA-FDD) defined by the communication network NW. The baseband unit 13 encodes/decodes transmission/reception data and multiplexes/demultiplexes transmission/reception packets under the control of the control unit 15. The user interface unit 14 has a loudspeaker 141, a microphone 142, an input device 143 including various kinds of module keys and a key pad, and a display device 144 including an LCD and LEDs.
The storage unit 16 uses, e.g., a hard disk memory or NAND flash memory as a storage medium and stores application programs and copyrighted content downloaded from the rights server RI. The external connection interface 17 transfers data to another terminal via the signal cable CB under the control of the control unit 15.
The control unit 15 comprises a central processing unit (CPU). The control unit 15 has an RO conversion control module 151 and a transfer control module 152 as control modules necessary for practicing the present invention. These control modules are implemented by causing the CPU to execute application programs stored in the program memory in the storage unit 16 in advance.
When the user executes, via the input device 143, an input operation to request movement (including partial assignment) of copyrighted content, the RO conversion control module 151 executes, for the rights object RO of the copyrighted content as a moving target, conversion processing necessary for movement. In this conversion processing, the rights object RO is re-encrypted by using a terminal public key acquired from a moving destination terminal, and rights information and signature are rewritten by using the terminal private key of a moving source terminal.
When the user executes, via the input device 143, an input operation to request movement (including partial assignment) of copyrighted content, the transfer control module 152 executes processing of transferring the copyrighted content as the moving target from its terminal to another terminal of the moving destination in cooperation with the conversion processing by the RO conversion control module 151. The rights object RO is transferred from the external connection interface 17 via the signal cable CB.
The copyrighted content moving method will be described next on the basis of the above-described arrangement.
An example will be described in which the terminal TA acquires copyrighted content from the rights server RI and moves it to the terminal TB upon, e.g., changing the model.
The copyrighted content includes encrypted content EC and the rights object RO, which are generated by the rights server RI in the following way.
In step S41, content C is encrypted by a content encryption key KCEK. In step S42, the content encryption key KCEK is encrypted by a key encryption key KREK. In step S43, the key encryption key KREK is encrypted together with a MAC key KMAC by a public key KPUB
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption key KREK and MAC key KMAC encrypted by the public key KPUB
A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S45 on the basis of the elements contained in the rights object RO and used to verify the presence/absence of alteration of the rights object RO.
The copyrighted content is acquired in the following manner. In step S31, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the encrypted content EC and rights object RO from the rights server RI in step S32. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the terminal TA changes its model, the user operates the input device 143 of the terminal TA to input a request to move the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via the signal cable CB or local communication. In step S33, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO for the terminal TB, i.e., a rights object RO (3) that binds rights information with the signature of the terminal TA to the terminal TB in step S34. The rights object RO conversion method will be described later in detail.
Upon completing the conversion processing, the terminal TA transfers the encrypted content EC and rights object RO (4) as the moving target to the terminal TB via the signal cable CB or local communication in step S35. The terminal TB stores the transferred encrypted content EC and rights object RO (5) in the storage unit 16. The copyrighted content is thus moved. From then on, the terminal TB can play the copyrighted content.
Some examples of the rights object RO conversion method executed by the terminal TA of the moving source will be described next.
To convert a rights object ROA of the terminal TA into a rights object ROB for the terminal TB, the terminal TA changes the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA. In addition, if details of rights information R2 after movement change from details of rights information R1 before movement, the terminal TA rewrites the signature of the rights holder of the rights information R2 after change. Even when details of rights information do not change, the signature of the rights holder is rewritten in accordance with the same procedure.
In step S51, the control unit 15 of the terminal TA temporarily decrypts the encrypted key encryption key KREK+MAC key KMAC in the rights object ROA by using a terminal private key KPRI
The control unit 15 also generates the rights information R2 by moving or separating part of the rights information R1 in the rights object ROA. In step S53, the signature of the rights holder of the rights information R2 after change is regenerated on the basis of the terminal private key KPRI
In step S54, the control unit 15 recalculates the MAC value for the constituent elements of the new rights object ROB for the terminal TB and adds the recalculated MAC value to the rights object ROB for the terminal TB.
To convert the rights object ROA of the terminal TA into the rights object ROB for the terminal TB, the terminal TA changes the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA. The terminal TA also adds rights consumption information to the rights object ROB for the terminal TB. The terminal TA also generates the signature of the rights holder of the rights consumption information and adds it to the rights object ROB.
In step S61, the control unit 15 of the terminal TA temporarily decrypts the encrypted key encryption key KREK+MAC key KMAC in the rights object ROA by using the terminal private key KPRI
The control unit 15 generates rights consumption information and adds the generated rights consumption information to the rights object ROB for the terminal TB. In step S63, the control unit 15 generates a signature for the rights consumption information on the basis of the terminal private key KPRI
In step S64, the control unit 15 recalculates the MAC value for the constituent elements of the new rights object ROB for the terminal TB and adds the recalculated MAC value to the rights object ROB for the terminal TB.
To convert the rights object ROA of the terminal TA into the rights object ROB for the terminal TB, the terminal TA changes the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA. The terminal TA also adds rights consumption information to the rights object ROB for the terminal TB. The terminal TA also generates the signature of the rights holder of the rights consumption information and adds it to the rights object ROB. The terminal TA also rewrites the signature of existing rights information to the signature of the terminal TA.
As in
The control unit 15 generates rights consumption information and adds the generated rights consumption information to the rights object ROB for the terminal TB. In step S74, the control unit 15 generates a signature for the rights consumption information on the basis of the terminal private key KPRI
Simultaneously in step S73, the control unit 15 regenerates the signature of the rights information in the rights object ROB for the terminal TB on the basis of the terminal private key KPRI
In step S75, the control unit 15 recalculates the MAC value for the constituent elements of the new rights object ROB for the terminal TB and adds the recalculated MAC value to the rights object ROB for the terminal TB.
As described above, according to the first embodiment, to move copyrighted content acquired from the rights server RI from the terminal TA to the terminal TB, the terminal TA of the moving source re-encrypts the key encryption key KREK+MAC key KMAC in the rights object ROA ((2) in
According to the first embodiment, the rights object RO is binding-converted from the terminal TA of the moving source to the terminal TB of the moving destination. Even when the rights information itself changes, or rights consumption information is added, the signature is appropriately regenerated. It is therefore possible to move the copyrighted content directly from the terminal TA to the terminal TB.
In the second embodiment of the present invention, copyrighted content moves from a moving source terminal to a moving destination terminal via a rights server. The rights server and moving source terminal cooperatively execute binding conversion processing of a rights object RO and rewrite processing of rights information and its signature.
The rights server RI includes a Web server and has a central processing unit (CPU) 21. A program memory 23 and a content memory 24 connect to the CPU 21 via a bus 22. A communication interface 25 and an RO management table 26 also connect to the CPU 21.
The communication interface 25 transmits data to the terminals TA and TB in accordance with a communication protocol defined by a communication network NW under the control of the CPU 21. For example, a Transmission Control Protocol/Internet Protocol (TCP/IP) is used as the communication protocol.
The content memory 24 stores copyrighted content as a download target. Copyrighted content contains encrypted content EC and a rights object RO which are stored in correspondence with each other. The RO management table 26 stores rights information and a key encryption key+MAC key in correspondence with the RO information (ROID) of each rights object RO.
The program memory 23 includes a hard disk or a nonvolatile memory such as a ROM and stores an RO conversion control program 231 and a transfer control program 232 as control application programs according to the present invention.
Upon receiving a rights object conversion request from a moving source (assignment source) terminal or moving destination (assignment destination) terminal, the RO conversion control program 231 causes the CPU 21 to execute, for the rights object RO, conversion processing necessary for movement. In this conversion processing, the rights object RO is re-encrypted by using a terminal public key acquired from a moving destination terminal, and rights information and signature are rewritten by the private key of the rights server RI.
Upon receiving a rights object conversion request from a moving source terminal or moving destination terminal, the transfer control program 232 causes the CPU 21 to execute processing of transferring the copyrighted content as the moving target from the moving source terminal to the moving destination terminal in cooperation with the conversion processing by the RO conversion control program 231. The rights object is transferred via the communication network NW.
The copyrighted content moving (assignment) method will be described next on the basis of the above-described arrangement.
The format of the encrypted content EC and rights object RO generated by the rights server RI will be described first.
In step S141, content C is encrypted by a content encryption key KCEK. In step S142, the content encryption key KCEK is encrypted by a key encryption key KREK. In step S143, the key encryption key KREK is encrypted together with a MAC key KMAC by a public key KPUB
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption key KREK and MAC key KMAC encrypted by the public key KPUB
A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S145 on the basis of the elements contained in the rights object RO and used to verify the presence/absence of alteration of the rights object RO.
The RO management table 26 in the rights server RI manages the rights object RO generated for each item of copyrighted content in the above-described way. For example, rights information and a key encryption key KREK+MAC key KMAC are stored for each rights object RO in correspondence with ROID, as shown in
The copyrighted content moving method between terminals via the rights server RI will be described next by means of several examples.
In step S91, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the rights object RO from the rights server RI in step S92. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the terminal TA changes its model, the user operates an input device 143 of the terminal TA to input a request to move (assign) the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via a signal cable CB or local communication. In step S93, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO to request the rights server RI to transfer to the terminal TB in step S94.
In this conversion processing, the key encryption key KREK+MAC key KMAC of the rights object RO ((2) in
Upon completing the conversion processing, the terminal TA transfers the converted rights object RO to the rights server RI via the communication network NW and requests the rights server RI to assign the rights object to the terminal TB in step S95.
Upon receiving the assignment request, the rights server RI executes registration processing in the terminal TB of the assignment destination, and the rights server RI and terminal TB exchange each other's public keys in step S96. After confirming each other's validity, the rights server RI converts the rights object RO (3) sent from the terminal TA, i.e., the rights object that binds the rights information with the signature of the terminal TA to the rights server RI into the rights object RO for the terminal TB in step S97.
In this conversion processing, the key encryption key KREK+MAC key KMAC of the rights object RO ((3) in
Upon completing the conversion processing, the rights server RI transmits the generated rights object RO (4) to the terminal TB of the assignment destination via the communication network NW in step S98. On the other hand, the encrypted content EC is transferred directly from the terminal TA of the assignment source to the terminal TB via the signal cable CB, local communication, or memory card. The terminal TB stores, in the storage unit 16, the encrypted content EC transferred from the terminal TA and the rights object RO (5) sent from the rights server RI. The copyrighted content is thus assigned via the rights server RI. From then on, the terminal TB can play the copyrighted content.
In step S101, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the rights object RO from the rights server RI in step S102. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the user inputs, from the input device 143, a request to move the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via the signal cable CB or local communication. In step S103, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO to request the rights server RI to transfer in step S104.
In this conversion processing, the key encryption key KREK of the rights object RO ((2) in
Upon completing the conversion processing, the terminal TA transfers the converted rights object RO to the rights server RI via the communication network NW and requests the rights server RI to assign the rights object to the terminal TB in step S105.
Upon receiving the assignment request, the rights server RI executes registration processing in the terminal TB of the assignment destination, and the rights server RI and terminal TB exchange each other's public keys in step S106. After confirming each other's validity, the rights server RI converts the rights object RO sent from the terminal TA, i.e., the rights object RO (3) that binds the rights information with the signature of the terminal TA to the terminal TB into the rights object RO for the terminal TB in step S107.
In this conversion processing, only processing of changing the signature of the rights information of the rights object RO ((3) in
Upon completing the conversion processing, the rights server RI transmits the generated rights object RO (4) to the terminal TB of the assignment destination via the communication network NW in step S108. On the other hand, the encrypted content EC is transferred directly from the terminal TA of the assignment source to the terminal TB via the signal cable CB, local communication, or a storage medium such as a memory card, as in the first example. The terminal TB stores, in the storage unit 16, the encrypted content EC transferred from the terminal TA and the rights object RO (5) sent from the rights server RI. The copyrighted content is thus assigned via the rights server RI. From then on, the terminal TB can play the copyrighted content.
In step S111, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the rights object RO from the rights server RI in step S112. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the user inputs, from the input device 143, a request to move the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via the signal cable CB or local communication. In step S113, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO for which it is necessary to request the rights server RI to only rewrite the signature in step S114.
In this conversion processing, the key encryption key KREK of the rights object RO ((2) in
Upon completing the conversion processing, the terminal TA directly transfers the encrypted content EC and the converted rights object RO to the terminal TB of the assignment destination in step S115 via the signal cable CB, local communication, or a storage medium such as a memory card. The terminal TB confirms the necessity of signature rewrite request to the rights server RI.
Upon confirming the necessity of signature rewrite, the terminal TB executes registration processing in the rights server RI in step S116. The terminal TB and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TB transmits, to the rights server RI via the communication network NW, the rights object RO (4) transferred from the terminal TA and also transmits the rights rewrite request of the rights object RO (4) in step S117.
Upon receiving the rights rewrite request from the terminal TB, the rights server RI converts the rights object RO (4) received simultaneously, i.e., the rights object RO (4) that binds the rights information with the signature of the terminal TA to the terminal TB into the rights object RO for the terminal TB.
In this conversion processing, only processing of changing the signature of the rights information of the rights object RO ((4) in
Upon completing the conversion processing, the rights server RI transmits the generated rights object RO (5) to the terminal TB of the assignment destination via the communication network NW in step S119. The terminal TB stores, in the storage unit 16, the encrypted content EC transferred from the terminal TA and the rights object RO (6) sent from the rights server RI. The copyrighted content is thus assigned via the rights server RI. From then on, the terminal TB can play the copyrighted content.
In step S121, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the rights object RO from the rights server RI in step S122. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the user inputs, from the input device 143, a request to move the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via the signal cable CB or local communication. In step S123, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO for the terminal TB of the moving destination (assignment destination) in step S124.
In this conversion processing, the key encryption key KREK of the rights object RO ((2) in
Upon completing the conversion processing, the terminal TA transfers the converted rights object RO to the rights server RI via the communication network NW and requests the rights server RI to replace the signature of the rights object RO in step S125.
Upon receiving the signature replacement request, the rights server RI converts the rights object RO sent from the terminal TA, i.e., the rights object RO (3) that binds the rights information with the signature of the terminal TA to the terminal TB into a rights object RO for the terminal TB in step S126.
In this conversion processing, only processing of changing the signature of the rights information of the rights object RO ((3) in
Upon completing the conversion processing, the rights server RI returns the generated rights object RO (4) to the terminal TA of the assignment source via the communication network NW in step S127. Upon receiving the rights object RO (4) with the rewritten signature, the terminal TA transfers the returned rights object RO (5) and encrypted content EC to the terminal TB of the assignment destination via the signal cable CB.
The terminal TB stores, in the storage unit 16, the encrypted content EC and the rights object RO (6) transferred from the terminal TA. Additionally, the terminal TB executes registration processing in the rights server RI, and they exchange each other's public keys. The copyrighted content is thus assigned from the terminal TA to the terminal TB via the rights server RI. From then on, the terminal TB can play the copyrighted content.
In step S131, the terminal TA executes registration processing in the rights server RI. The terminal TA and rights server RI exchange each other's public keys. After confirming each other's validity, the terminal TA acquires the rights object RO from the rights server RI in step S132. At this time, the rights object RO binds rights information with the signature of the rights server RI to the terminal TA, as indicated by (1) and (2) in
Assume that in this state, the user operates the input device 143 of the terminal TA to input a request to move (assign) the copyrighted content to the terminal TB. The terminal TA connects to the terminal TB of the moving destination via the signal cable CB or local communication. In step S133, registration processing is executed between the terminals TA and TB. They exchange each other's terminal public keys. After confirming each other's validity, the terminal TA converts the rights object RO as the moving target, i.e., the rights object RO (2) that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO (3) to request the rights server RI to transfer to the terminal TB in step S134.
If the rights object RO is Stateful, and the rights are partially consumed, or if only partial rights are to be assigned to the terminal TB, rights consumption information is added to the rights object RO (2). Rights object RO conversion processing with addition of rights consumption information is executed in the following way.
A control unit 15 of the terminal TA adds rights consumption information to a rights object ROA2 of the assignment destination. In step S151, the control unit 15 generates a signature for the added rights consumption information on the basis of the private key KPRI
Upon completing the conversion processing from the rights object RO (2) to the rights object RO (3), the terminal TA transfers the converted rights object RO (3) to the rights server RI via the communication network NW and requests the rights server RI to assign the rights object to the terminal TB in step S135.
Upon receiving the assignment request, the rights server RI executes registration processing in the terminal TB of the assignment destination, and the rights server RI and terminal TB exchange each other's public keys in step S136. After confirming each other's validity, the rights server RI converts the rights object RO (3) sent from the terminal TA, i.e., the rights object RO that binds the rights information with the signature of the rights server RI to the terminal TA into a rights object RO (4) for the terminal TB in step S137.
Two methods are available for this conversion processing.
In step S172, the CPU 21 recalculates the MAC value of the elements of the rights object ROB as the assignment target having the rewritten key encryption key and MAC key on the basis of the MAC key read from the RO management table 26. The CPU 21 rewrites the MAC value of the elements of the rights object ROB as the assignment target to the recalculated MAC value.
The CPU 21 generates rights information R2 from rights information R1 and rights consumption information. In step S182, the CPU 21 changes the signature of the existing rights information R2 contained in the rights object ROB as the assignment target on the basis of the private key KPRI
In step S183, the CPU 21 recalculates the MAC value of the elements of the rights object ROB as the assignment target having the rewritten key encryption key and MAC key and changed signature of the existing rights information R2 on the basis of the MAC key read from the RO management table 26. The CPU 21 rewrites the MAC value of the elements of the rights object ROB as the assignment target to the recalculated MAC value.
Upon completing the conversion processing to the rights object RO (4), the rights server RI transmits the generated rights object RO (4) to the terminal TB of the assignment destination via the communication network NW in step S138. On the other hand, the encrypted content EC is transferred directly from the terminal TA of the assignment source to the terminal TB via the signal cable CB. The terminal TB stores, in the storage unit 16, the encrypted content EC transferred from the terminal TA and the rights object RO (5) sent from the rights server RI. The copyrighted content is thus assigned via the rights server RI. The terminal TB can therefore play the copyrighted content.
As described above, in the second embodiment, to move (assign) copyrighted content bound to a terminal from the terminal TA to another terminal TB via the rights server RI, the terminal TA of the assignment source re-encrypts the key encryption key KREK+MAC key KMAC in the rights object RO by using the terminal public key KPUB
Hence, according to the second embodiment, the rights object RO is binding-converted from the terminal TA of the moving source to the terminal TB of the moving destination. Even when the rights information itself changes, or rights consumption information is added, the signature is appropriately regenerated from a signature by the terminal TA to a signature by the rights server RI. It is therefore possible to move the copyrighted content from the terminal TA to the terminal TB via the rights server RI.
The rights server RI has the RO management table 26. Upon receiving a rights object assignment request from the terminal TA of the assignment source, the rights server RI searches the RO management table 26 for a key encryption key and MAC key corresponding to the rights object on the basis of the ROID of the rights object and executes binding conversion processing of the found key encryption key and MAC key of the rights object. Hence, the rights server RI can reissue the rights object of the assignment destination on the basis of past rights object RO element information. That is, the processing in the terminal TA can be reduced.
The terminal TM comprises a central processing unit (CPU) 31. A program memory 33 and a content memory 34 connect to the CPU 31 via a bus 32. A communication interface 35, external connection interface 37, and input/output interface 38 also connect to the CPU 31.
The communication interface 35 connects to an antenna 36 to execute wireless communication with a base station (not shown). The communication interface 35 also communicates with a content server via the base station to download content. For example, a Transmission Control Protocol/Internet Protocol (TCP/IP) is used as the communication protocol. The external connection interface 37 has, e.g., a USB interface function and transfers, e.g., encrypted content to another terminal via the signal cable CB. An input device 39, output device 40, and display device 41 connect to the input/output interface 38. The input device 39 includes a plurality of function keys and a key pad. A user uses the input device 39 to input commands related to communication and content play. The output device 40 has a speaker and outputs an audio signal decoded by an audio decoder provided in the input/output interface 38. The display device 41 includes a liquid crystal display and displays various kinds of information necessary for the communication operation of the terminal and related to play of content.
The program memory 33 includes a hard disk or a nonvolatile memory such as a ROM and stores a domain enforcement agent (DEA) 331 and a digital rights management (DRM) agent 332 as control application programs according to the present invention.
The DRM agent 332 has an RO management program 3321. Copyrighted content downloaded from the content server contains content and rights object RO. The RO management program 3321 causes the CPU 31 to manage the rights object RO. To play the content, the RO management program 3321 causes the CPU 31 to decrypt the rights object RO and the encrypted content.
The DEA 331 is an entity that shares a policy (domain policy) for a user domain in place of a domain authority (DA). The DEA 331 has a user domain management program 3311 and an RO generation program 3312. The user domain management program 3311 causes the CPU 31 to execute processing related to user domain member management and user domain key issue. The RO generation program 3312 causes the CPU 31 to generate or regenerate the rights object RO in dividing or merging user domains. The domain policy indicates an attribute group including the number of terminals using the same user domain, the life of a user domain, and permission/inhibition of user domain division/merger.
The content memory 34 uses, e.g., a hard disk or NAND flash memory as a storage medium and comprises a content management unit 341. The content management unit 341 encrypts and stores content contained in the rights object RO that includes the content and rights object RO.
The content stored in the content management unit 341 and the rights object RO for a user domain stored in the program memory 33 have the following structures.
In step S21, content C is encrypted by a content encryption key KCEK and stored in the content management unit 341. In step S23, the content encryption key KCEK is encrypted by a key encryption key KREK. In step S24, the key encryption key KREK is encrypted together with the MAC key KMAC by a user domain key KD managed as secret information DS0 in DEA. The content encryption key KCEK and key encryption key KREK are generated on the basis of random numbers. In step S22, the signature of the rights holder of rights information is generated on the basis of a DEA private key KPRI
The key encryption key KREK may be generated by using not a random number but information (e.g., device number or telephone number) unique to the terminal.
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption key KREK and MAC key KMAC encrypted by the user domain key KD. The RO management program 3321 stores the rights object RO. A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S25 on the basis of the elements contained in the rights object RO. The presence/absence of alteration of the rights object can be verified by calculating the MAC value except that of the rights object RO by using the MAC key KMAC and determining whether the calculated value matches the MAC value added to the rights object RO.
The operation of the terminal TM having the above-described arrangement will be described next.
In this example, a new user domain key is used to divide/merge user domains. For example, as shown in
The program memory 33 of the terminal TM stores, as secret information DS1 in DEA, a new user domain key KD2 to be used for user domain division/merger in addition to an active user domain key KD1. The program memory 33 also stores the DEA private key KPRI
To generate a new rights object ROB based on a rights object ROA without changing details of rights information upon user domain division/merger, the terminal changes only the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA.
As shown in
To generate a new rights object ROB based on a rights object ROA upon user domain division/merger, the terminal changes the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA. If details of rights information R2 after division/merger change from those of rights information R1 before merger, the terminal changes the signature of the rights holder of the rights information R2 after change.
As shown in
The CPU 31 generates the rights information R2 by moving or dividing part of the rights information R1 in the rights object ROA. In step S234, the CPU 31 regenerates the signature of the rights holder of the rights information R2 after change on the basis of the DEA private key KPRI
In step S233, the CPU 31 recalculates the MAC value for the constituent elements of the new rights object ROB on the basis of the decrypted MAC key KMAC and adds the recalculated MAC value to the new rights object ROB.
In this example, upon dividing a user domain, a plurality of user domain keys prepared in advance are assigned to divided user domains. Upon merging user domains, user domain keys used in the plurality of user domains before merger are assigned to the merged user domain.
For example, as shown in
The encryption format of the rights object RO valid for a plurality of user domains has, e.g., the following structure.
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption keys KREK and MAC keys KMAC encrypted by the user domain keys KD1 and KD2. The RO management program 3321 stores the rights object RO. A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S256 on the basis of the elements contained in the rights object RO.
The program memory 33 of the terminal TM stores, as the secret information DS2 in DEA, the user domain key KD2 for user domain merger in addition to the active user domain key KD1. The program memory 33 also stores the DEA private key KPRI
In merging two user domains into one user domain, the terminal re-encrypts the key encryption key KREK+MAC key KMAC of the rights object ROA, which are encrypted by the user domain key KD1, by using the user domain key KD2 and adds the re-encrypted key encryption key KREK+MAC key KMAC to the new rights object ROB after merger so as to validate both the user domain keys used in the user domains before merger.
More specifically, as shown in
In merging two user domains into one user domain, the terminal re-encrypts the key encryption key KREK+MAC key KMAC of the rights object ROA, which are encrypted by the user domain key KD1, by using the user domain key KD2 and adds the re-encrypted key encryption key KREK+MAC key KMAC to the new rights object ROB after merger so as to validate both the user domain keys used in the user domains before merger. If details of rights information change before and after merger, the terminal changes the signature of the rights holder of the rights information R2 after change.
More specifically, as shown in
The CPU 31 generates the rights information R2 by moving or dividing part of the rights information R1 in the rights object ROA. In step S274, the CPU 31 generates the signature of the rights holder of the rights information R2 after change on the basis of the DEA private key KPRI
In step S273, the CPU 31 recalculates the MAC value for the constituent elements of the new rights object ROB after merger on the basis of the MAC key KMAC decrypted in step S271 and adds the recalculated MAC value to the rights object ROB.
In dividing a user domain using two user domain keys into two user domains, the terminal deletes the key encryption key KREK+MAC key KMAC, which are encrypted by one of the two user domain keys, to validate only the other user domain key in the rights object after division.
More specifically, as shown in
In dividing a user domain using two user domain keys into two user domains, the terminal deletes the key encryption key KREK+MAC key KMAC, which are encrypted by one of the two user domain keys, to validate only the other user domain key in the rights object after division. If details of rights information change before and after division, the terminal changes the signature of the rights holder of the rights information R2 after change.
More specifically, as shown in
The CPU 31 generates the rights information R2 by moving or dividing part of the rights information R1 in the rights object ROA. In step S292, the CPU 31 generates the signature of the rights holder of the rights information R2 after change on the basis of the DEA private key KPRI
In (1) and (2), the rights object RO generation methods upon division/merger have been described. The DEA may move between terminals. In this case, the terminal executes the RO generation processing and then DEA moving processing in accordance with the following procedure. The DEA moves even at a time except user domain division/merger, e.g., when a terminal disjoins from a user domain.
User domain management information including the user domain key and domain policy is securely moved between DEAL before movement and DEA2 after movement, i.e., between a terminal TM1 and a terminal TM2.
For example, the terminals TM1 and TM2 exchange each other's public keys KPUB
In step S302, the terminal TM2 of the moving destination decrypts the user domain management information of the DEA1, which is encrypted and received from the terminal TM1 of the moving source, by using a private key KPRI
The terminal TM2 executes rights object RO conversion processing upon DNA movement in the following way. In step S303, the terminal TM2 verifies the validity of the signature of a rights object RO1 transferred from the terminal TM1 by decrypting it using the public key KPUB
After rewriting the signature, the terminal TM2 calculates the MAC value of the constituent elements in the rights object RO2 and adds the MAC value to the rights object RO2 again.
As described above, in the third embodiment, the rights object RO bound by a user domain key is converted upon user domain division/merger, and the DEA is moved between the terminals TM1 and TM2, as needed. More specifically, the following processing is executed.
(1) A new user domain key for the user domain of the division/merger destination is prepared, and the key encryption key KREK is re-encrypted by the new user domain key.
(2) A plurality of key encryption keys KREK encrypted by different user domain keys are prepared in the rights object RO in advance for division. Upon division, one of the encrypted key encryption keys KREK is added to the rights object RO of the division destination. Upon merger, the key encryption key KREK is re-encrypted by user domain keys used in the merger sources. The plurality of re-encrypted key encryption keys KREK are added to the rights object RO of the merger destination.
(3) If rights information in the rights object RO is to be changed by division/merger in (1) and (2), the signature of the rights holder of the rights information after change is regenerated.
(4) The MAC value is recalculated in accordance with the change in details of the new rights object ROB of the division/merger destination in (1) to (3). The MAC value of the new rights object ROB is replaced with the recalculated value.
(5) Upon moving the DEA in user domain division/merger, user domain management information including the user domain key KD and user policy is securely transferred between the terminals TM1 and TM2. The terminal TM2 of the moving destination regenerates the signature in the rights object RO.
Hence, according to the third embodiment, even when the environment changes due to movement of a member sharing a user domain, the member can continuously share the rights of content used before movement. Even when details of rights information change upon division/merger, the holder of the rights can be made clear. In addition, it is possible to take a proper measure against DNA movement upon user domain division/merger in consideration of security.
The signature of each rights information before and after change may be omitted.
In the third embodiment, the DEA adds a signature to rights information. In the fourth embodiment of the present invention, a rights issuer such as a rights server adds a signature to rights information. Under this condition, a terminal regenerates a rights object RO upon user domain division/merger.
An information terminal apparatus (terminal) TM according to the fourth embodiment stores an RO update program not in the RO generation program 3312 shown in
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption key KREK and MAC key KMAC encrypted by the user domain key KD. An RO management program 3321 in a DRM agent 332 stores the rights object RO. A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S315 on the basis of the elements contained in the rights object RO. The MAC value is used to verify the presence/absence of alteration of the rights object.
An operation of causing the terminal TM to divide/merge the user domains of the rights object RO for a user domain generated by the RI will be described next.
In this example, a new user domain key is used to divide/merge user domains. For example, as shown in
The program memory 33 of the terminal TM stores, as secret information DS4 in DEA, a new user domain key KD2 to be used for user domain division/merger in addition to an active user domain key KD1. The program memory 33 also stores a DEA private key KPRI
To regenerate a new rights object ROB based on a rights object ROA without changing details of rights information upon user domain division/merger, the terminal changes only the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA.
As shown in
To regenerate a new rights object ROB based on a rights object ROA upon user domain division/merger, the terminal changes the key encryption key KREK+MAC key KMAC and the MAC value of the elements contained in the rights object ROA.
If details of rights information R2 after division/merger change from those of rights information R1 before merger, the terminal adds rights consumption information representing the rights information after change to the new rights object ROB. The terminal also generates the signature of the DEA for the rights consumption information and adds the signature to the rights object ROB.
As shown in
In changing the details of the rights information of the new rights object ROB from the rights information in the rights object ROA, the CPU 31 generates rights consumption information separately from the existing rights information and adds the generated rights consumption information to the new rights object ROB. In step S333, the CPU 31 generates a signature for the rights consumption information on the basis of the DEA private key KPRI
In step S334, the CPU 31 recalculates the MAC value for the constituent elements of the new rights object ROB on the basis of the decrypted MAC key KMAC and adds the recalculated MAC value to the new rights object ROB.
In this example, upon dividing a user domain, a plurality of user domain keys prepared in advance are assigned to divided user domains. Upon merging user domains, user domain keys used in the plurality of user domains before merger are assigned to the merged user domain.
For example, as shown in
The rights object RO valid for a plurality of user domains is generated by the rights server RI and has an encryption format having, e.g., the following structure.
In step S341, the content C is encrypted by the content encryption key KCEK. In step S343, the content encryption key KCEK is encrypted by the key encryption key KREK. In steps S344 and S345, the key encryption key KREK is encrypted together with the MAC key KMAC by the two different user domain keys KD1 and KD2 acquired from the DEA. The content encryption key KCEK and key encryption key KREK are generated on the basis of random numbers. In step S342, the signature of the rights holder of rights information is generated on the basis of the RI private key KPRI
The rights object RO contains the rights information, the signature, the content encryption key KCEK encrypted by the key encryption key KREK, and the key encryption keys KREK and MAC keys KMAC encrypted by the user domain keys KD1 and KD2. The RO management program 3321 stores the rights object RO. A message authentication code (MAC) value is added to the rights object RO. The MAC value is calculated in step S346 on the basis of the elements contained in the rights object RO. The MAC value is used to verify the presence/absence of alteration of the rights object.
The program memory 33 of the terminal TM stores, as secret information DS2 in DEA, the user domain key KD2 for user domain merger in addition to the active user domain key KD1.
In merging two user domains into one user domain, the terminal TM re-encrypts the key encryption key KREK+MAC key KMAC of the rights object ROA, which are encrypted by the user domain key KD1, by using the user domain key KD2 and adds the re-encrypted key encryption key KREK+MAC key KMAC to the new rights object ROB after merger so as to validate both the user domain keys used in the user domains before merger.
More specifically, as shown in
In merging two user domains into one user domain, the terminal TM copies, to the rights object ROB, the key encryption key KREK+MAC key KMAC of the rights object ROA, which are encrypted by the user domain key KD1, re-encrypts the key encryption key KREK+MAC key KMAC by using the user domain key KD2, adds the re-encrypted key encryption key KREK+MAC key KMAC to the new rights object ROB after merger so as to validate both the user domain keys used in the user domains before merger. If details of rights information change before and after merger, the terminal generates rights consumption information separately from the existing rights information and its signature and adds them to the rights information R2 after change.
More specifically, as shown in
The CPU 31 generates rights consumption information separately from the rights information in the rights object RO and adds the generated rights consumption information to the new rights object ROB after merger. In step S364, the CPU 31 also generates the signature of the DEA for the rights consumption information on the basis of the DEA private key KPRI
In step S363, the CPU 31 recalculates the MAC value for the constituent elements of the new rights object ROB after merger on the basis of the MAC key KMAC decrypted in step S361 and replaces the MAC value of the rights object ROB after merger with the recalculated MAC value.
In dividing a user domain using two user domain keys into two user domains, the terminal deletes the key encryption key KREK+MAC key KMAC, which are encrypted by one of the two user domain keys, to validate only the other user domain key in the rights object after division.
More specifically, as shown in
In step S371, the CPU 31 decrypts the key encryption key KREK+MAC key KMAC, which are encrypted by the user domain key KD2, in the rights object ROA by using the user domain key KD2 of the secret information DS4 in DEA. In step S372, the CPU 31 recalculates the MAC value for the constituent elements of the rights object ROB after division and adds the recalculated MAC value to the rights object ROB after division.
In dividing a user domain using two user domain keys into two user domains, the terminal deletes the key encryption key KREK+MAC key KMAC, which are encrypted by one of the two user domain keys, to validate only the other user domain key in the rights object after division. If details of rights information change before and after division, the terminal newly generates rights consumption information and its signature and adds them to the rights object ROB after division.
More specifically, as shown in
The CPU 31 newly generates rights consumption information and adds it to the rights object ROB after division. In step S383, the CPU 31 generates the signature of the DEA for the rights consumption information on the basis of the DEA private key KPRI
In step S381, the CPU 31 decrypts, on the basis of the user domain key KD2 of the secret information DS4 in DEA, the key encryption key KREK+MAC key KMAC encrypted by the user domain key KD1 in the rights object RO before division. In step S382, the CPU 31 recalculates the MAC value for the constituent elements of the rights object ROB after division on the basis of the decrypted MAC key KMAC and replaces the MAC value of the rights object ROB after division with the recalculated MAC value.
In (2-3) and (2-4), the key encryption key KREK+MAC key KMAC encrypted by the user domain key KD1 are copied to the rights object ROB after division. Instead, the key encryption key KREK+MAC key KMAC encrypted by the user domain key KD2 may be copied to the rights object ROB after division. The signatures of rights information and rights consumption information may be omitted.
To move the DEA directly between terminals upon user domain division/merger, the RO generation processing is executed, and then DEA moving processing is executed in accordance with the following procedure. The DEA moves even at a time except user domain division/merger, e.g., when a terminal disjoins from a user domain.
User domain management information including the user domain key and domain policy is securely moved between DEA1 before movement and DEA2 after movement, i.e., between a terminal TM1 and a terminal TM2. If secure transfer of the user domain management information is successful, the terminal TM2 of the moving destination returns a DEA registration completion notification to the terminal TM1 of the moving source. Upon receiving the DEA registration completion notification, the terminal TM1 of the moving source erases the user domain management information including the user domain key and domain policy from a DEA 331 in step S391. The user domain management information may be erased upon completing transmission of the user domain management information before receiving the DEA registration completion notification.
To securely transfer user domain management information between the terminals TM1 and TM2, they exchange each other's public keys KPUB
In step S402, the terminal TM2 of the moving destination decrypts the user domain management information of the DEA1, which is encrypted and received from the terminal TM1 of the moving source, by using a private key KPRI
In this example, the terminals TM1 and TM2 establish a secure session between them in advance to transfer user domain management information via the secure session.
The terminals TM1 and TM2 establish a secure session between them and share the session key. In step S411, the terminal TM1 encrypts user domain management information including the user domain key KD and user policy by using the session key and transfers the encrypted user domain management information to the terminal TM2. In step S412, the terminal TM2 decrypts, on the basis of the session key, the user domain management information encrypted and transferred from the terminal TM1. The terminal TM2 saves the decrypted user domain key KD and user policy in the DEA 331 as secret information in the DEA2.
(4) DEA Movement Via Rights Server
In this example, user domain management information transfer between the terminals TM1 and TM2 is done via the rights server serving as a rights issuer RI.
Information representing the terminal TM2 of the moving destination and user domain management information including the user domain key KD and user policy are securely transmitted from the terminal TM1 of the transfer source to the rights server RI via a communication network (not shown). On the basis of the information representing the terminal TM2 of the moving destination, which is received from the terminal TM1, the rights server RI transmits the user domain management information sent from the terminal TM1 to the terminal TM2 of the moving destination via the communication network.
Upon receiving the user domain management information from the rights server RI, the terminal TM2 of the moving destination saves the information in its DEA 331 and determines whether the user domain management information is successfully received. If reception is successful, the terminal TM2 returns a DEA registration completion notification to the rights server RI. If reception fails, the terminal TM2 returns a registration failure notification to the rights server RI.
Upon receiving the DEA registration completion notification from the terminal TM2 of the moving destination, the rights server RI transmits a movement completion notification to the terminal TM1 of the moving source. Upon receiving the movement completion notification from the rights server RI, the terminal TM1 determines that the moving processing is completed and erases the user domain management information in step S421. If the rights server RI that has received the registration failure notification transmits a movement failure notification, the terminal TM1 displays “movement failure” for the user and continuously holds the user domain management information without erasing.
The terminal TM1 and rights server RI exchange the public keys KPUB
The rights server RI and terminal TM2 exchange the public keys KPUB
As described above, the fourth embodiment assumes that the rights issuer RI such as a rights server adds a signature to rights information. Under this condition, the terminal TM regenerates (changes) the rights object RO upon user domain division/merger. The DEA is moved between the terminals TM1 and TM2 directly or via the rights server RI, as needed. More specifically, the following processing is executed as in the third embodiment.
(1) A new user domain key for the user domain of the division/merger destination is prepared, and the key encryption key KREK is re-encrypted by the new user domain key.
(2) A plurality of key encryption keys KREK encrypted by different user domain keys are prepared in the rights object RO in advance for division. Upon division, one of the encrypted key encryption keys KREK is added to the rights object RO of the division destination. Upon merger, the key encryption key KREK is re-encrypted by user domain keys used in the merger sources. The re-encrypted key encryption keys KREK are added to the rights object RO of the merger destination.
(3) If rights information in the rights object RO is to be changed in (1) and (2), rights consumption information and its signature are newly generated and added to the rights object ROB of the division/merger destination.
(4) The MAC value is recalculated in accordance with the constituent elements of the rights object ROB newly generated for division/merger destination in (1) to (3). The MAC value of the new rights object ROB is replaced with the recalculated value.
(5) Upon moving the DEA in user domain division/merger, user domain management information including the user domain key KD and user policy is securely transferred between the terminals TM1 and TM2 directly or via the rights server RI.
Hence, according to the fourth embodiment, even when the environment changes due to movement of a member sharing a user domain, the member can continuously share the rights of content used before movement. Even when details of rights information change upon division/merger, it is unnecessary to change the existing rights information and its signature because rights consumption information and its signature are generated in addition to the existing rights information. In addition, it is possible to take a proper measure against DNA movement upon user domain division/merger in consideration of security. When DEA transfer is done via the rights server RI, DEA movement can more strictly be managed.
The signature of each rights information and rights consumption information before and after change may be omitted.
In the first and second embodiments, when rights information is changed, or rights consumption information is added, its signature is also rewritten. However, the signature of the rights information need not always be added. In the above-described embodiments, a MAC value is added to the rights object. However, the MAC value need not always be added. As the copyrighted content acquisition method, copyrighted content is downloaded from a content server or rights server or read from a recording medium.
In the first and second embodiments, rights consumption information representing a rights consumption state is added to the rights object. Instead of rights consumption information, information representing the rights usable range may be added.
The rights object RO conversion procedure and details of the processing in the terminal TA or rights server RI upon movement (assignment) of copyrighted content, the type and arrangement of the information terminal apparatus, and the type of the copyrighted content and details of its rights can variously be changed or modified without departing from the spirit and scope of the present invention.
In the third and fourth embodiments, one user domain is divided into two user domains, or two user domains are merged into one user domain. However, the present invention is also applicable to division/merger of three or more user domains. In the above-described embodiments, a MAC value is added to the rights object. However, the MAC value need not always be added. As the copyrighted content acquisition method, copyrighted content is downloaded from a content server or rights server or read from a recording medium.
The rights object RO generation procedure and details of the processing upon user domain division/merger, the moving procedure and details of the processing upon DEA movement, the type and arrangement of the information terminal apparatus, and the type of the copyrighted content and details of its rights can variously be changed or modified without departing from the spirit and scope of the present invention.
That is, the present invention is not limited to the above-described embodiments and can be practiced by modifying the constituent elements without departing from its spirit and scope. Various inventions can be formed by appropriately combining the plurality of constituent elements disclosed in the above-described embodiments. For example, some of the constituent elements disclosed in the embodiments may be removed. Alternatively, the constituent elements of different embodiments may appropriately be combined.
Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2006-304362 | Nov 2006 | JP | national |
2006-329519 | Dec 2006 | JP | national |